Search Results - (( developing interactive computing algorithm ) OR ( its implementation using algorithm ))
Search alternatives:
- developing interactive »
- interactive computing »
- implementation using »
- computing algorithm »
- its implementation »
- using algorithm »
-
1
-
2
Scan Matching and KNN Classification for Mobile Robot Localisation Algorithm
Published 2017“…The localisation algorithm is developed using scan matching method which is incorporated with K-nearest neighbours (KNN) classification. …”
Get full text
Get full text
Conference or Workshop Item -
3
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…In line with the emerging field called Search based Software Engineering, many recently developed t-way strategies have adopted meta-heuristic algorithms as the basis of their implementations such as Simulated Annealing, Genetic Algorithm, Ant Colony Optimization Algorithm, Particle Swarm Optimization, Harmony Search and Cuckoo Search, owing their superior performance in term of test size reduction as compared to general computational based strategies, such as General t-way, Test Vector Generator, In Parameter Order General, Jenny, and Automatic Efficient Test Generator. …”
Get full text
Get full text
Thesis -
4
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
Get full text
Get full text
Thesis -
5
Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation
Published 2020“…Addressing the aforementioned issues, this research proposes the development and implementation of hybrid t-way strategy based Migrating Birds Optimization Algorithm (MBO) and Genetic Algorithm (GA) with elitism, termed Elitist Hybrid MBO-GA. …”
Get full text
Get full text
Thesis -
6
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…Per Hob Behavoiurs (PHBs) are implemented at DiffServ networks nodes using some scheduling and queuing mechanisms that are predecessor by markers and shaper. …”
Get full text
Get full text
Thesis -
7
Development of finite element model for soil-structure interaction
Published 2014“…Then, the special finite element algorithm and computer program (2DSSI) is developed to perform two-dimensional nonlinear SSI analysis by considering interfacial behavior of soil and frame elements. …”
Get full text
Get full text
Thesis -
8
Developement of 3D virtual environment for Teratai College, UiTM Shah Alam using open source platform / Tengku Mohd Najib Tengku Ishak
Published 2006“…Nowadays advances in computer graphics hardware algorithms, visualization and interactive techniques offer the components for high integrated and efficient real-time 3D Virtual Environment. …”
Get full text
Get full text
Thesis -
9
Spiking Neural Network For Energy Efficient Learning And Recognition
Published 2020“…The use of applications consumes energy and hard to perform through standard programmed algorithms. …”
Get full text
Get full text
Get full text
Article -
10
NFC secured online transaction in mobile computing business
Published 2012“…As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
Get full text
Get full text
Get full text
Article -
11
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…Ontology-driven MAS architecture that helps in providing a unified agent-based interaction system on top of cloud services using Protégé is implemented. …”
Get full text
Get full text
Thesis -
12
BLAZEBREAKER: GAMIFY THE FLAMES
Published 2024“…The report outlines the design and creation of the VR simulation, emphasizing the integration of a maze structure generated randomly using certain algorithm. Users are required to navigate through the maze, simulating the challenges posed by obstructive elements during fire emergencies. …”
Get full text
Get full text
Final Year Project -
13
CNN-LSTM: hybrid deep neural network for network intrusion detection system; a case
Published 2022“…We added batch normalization and dropout layers to the model to increase its performance. Based on the binary and multiclass classification, the model was trained using three datasets: CIC-IDS 2017, UNSW-NB15, and WSN-DS. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Enhanced emotion recognition in videos: a convolutional neural network strategy for human facial expression detection and classification
Published 2023“…Automated emotion recognition has garnered increasing interest due to its potential applications in various fields, such as human-computer interaction, machine learning, robotic control, and driver emotional state monitoring. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Automatic parking management system and parking fee collection based on number plate recognition
Published 2012“…The auto parking system will able to have less interaction of humans and use no magnetic card and its devices. In additions to that, it has parking guidance system that can show and guide user towards a parking space. …”
Get full text
Get full text
Get full text
Article -
16
A bat-inspired t-way strategy for mixed-strength test suite generation
Published 2017“…BTS is the first t-way strategy that adopts the Bat-inspired algorithm as its core implementation and adopts the Hamming distance as the final selection criteria to enhance the exploration of new solution. …”
Get full text
Get full text
Thesis -
17
-
18
Runtime pluggable CPU scheduler for linux operating system
Published 2010“…Process scheduler, or CPU scheduler is the component of the operating system that plays the role of processes coordination and synchronization. The CPU scheduler uses different scheduling policies (algorithms) to manage such processes. …”
Get full text
Get full text
Thesis -
19
-
20
